00xkhaled / Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. ππ»
β183Updated last year
Related projects: β
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β274Updated last year
- Parser for data dumps Collection #1 / Collection #2-5β142Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testingβ176Updated 5 years ago
- macOS Client-Side Phishing lock screen payloadβ126Updated 5 years ago
- β155Updated this week
- Office for Mac Macro Payload Generatorβ233Updated 7 years ago
- Collect information about email addresses from Pastebinβ35Updated 3 years ago
- β331Updated this week
- A list of private and public (more or less) blackhat boardsβ258Updated 5 years ago
- β149Updated this week
- mosquito - Automating reconnaissance and brute force attacksβ124Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)β459Updated 4 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.β136Updated 5 years ago
- Pastebin OSINT Harvesterβ316Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β318Updated last month
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β284Updated 3 months ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.β337Updated 3 years ago
- IP obfuscator made to make a malicious ip a bit cuterβ536Updated 5 years ago
- Collection of social engineering payloadsβ290Updated 6 years ago
- Simple python backdoor with Ngrok tunnel supportβ199Updated 9 months ago
- myBFF - a Brute Force Frameworkβ137Updated 9 months ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to heβ¦β394Updated 5 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxiesβ129Updated last year
- My collection of metasploit auxiliary post-modulesβ188Updated 5 years ago
- Python / C# Unmanaged PowerShell based RATβ770Updated last year
- just for fun Β―\_(γ)_/Β―β255Updated 8 years ago
- Arduino Rubber Ducky Frameworkβ105Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β172Updated 5 years ago
- β186Updated this week